Secure transmission design in HARQ assisted cognitive NOMA networks

Z Xiang, W Yang, Y Cai, Z Ding… - … Forensics and Security, 2020 - ieeexplore.ieee.org
… 1, we consider an HARQ assisted cognitive NOMA network, where an SRU and QSU are
paired to perform NOMA. Corresponding to cognitive radio, a remote QSU sensitive to QoS is …

Secure transmission via beamforming optimization for NOMA networks

Y Cao, N Zhao, Y Chen, M Jin, Z Ding… - IEEE Wireless …, 2019 - ieeexplore.ieee.org
… article, secure transmission schemes based on beamforming optimization are designed to
… Using the transmit beamforming design, we first propose two schemes to protect the privacy …

Secure transmission in MIMO-NOMA networks

Y Qi, M Vaezi - IEEE Communications Letters, 2020 - ieeexplore.ieee.org
design precoding and power allocation matrices to achieve the secrecy capacity region of
two-user Gaussian MIMO-NOMA networks … Then, we design the transmit covariance matrix for …

Secure transmission design for cooperative NOMA in the presence of internal eavesdropping

B Su, W Yu, H Liu, A Chorti… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
securely in the presence of eavesdroppers [12], has not been studied for cooperative NOMA
… an approach to secure the transmissions in a two-user cooperative NOMA, using EST as the …

NOMA in cooperative communication systems with energy-harvesting nodes and wireless secure transmission

A Salem, L Musavian - IEEE Transactions on Wireless …, 2020 - ieeexplore.ieee.org
… Hence, the distance-based users ranking can simplify the design of power allocation and
rate adaption for NOMA technique [29]. Consequently, in this work, the users are ordered …

Beamforming design and power allocation for secure transmission with NOMA

Y Feng, S Yan, Z Yang, N Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
… 1, we consider the secure transmission using NOMA from a base station (BS) to two legitimate
users in the presence of a multi-antenna eavesdropper (Eve). The BS is equipped with N …

Secure transmission in a NOMA-assisted IoT network with diversified communication requirements

Z Xiang, W Yang, Y Cai, J Xiong… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Considering the diversified communication requirements in the Internet-of-Things (IoT) networks,
this article proposes a nonorthogonal multiple access (NOMA) scheme which pairs two …

Secure transmission designs for NOMA systems against internal and external eavesdropping

K Cao, B Wang, H Ding, T Li, J Tian… - … Forensics and Security, 2020 - ieeexplore.ieee.org
… (NOMA) is to serve multiple users in the same resource block … resource sharing, a security
flaw of NOMA emerges in the … the reliable and secure transmission of NOMA systems with …

Secure transmission for downlink NOMA visible light communication networks

C Du, F Zhang, S Ma, Y Tang, H Li, H Wang, S Li - IEEE Access, 2019 - ieeexplore.ieee.org
… rate expression, we propose the optimal secrecy beamforming design for total transmission
power minimization problem and minimum secrecy rate maximization problem for the MISO …

Securing aerial-ground transmission for NOMA-UAV networks

X Chen, D Li, Z Yang, Y Chen, N Zhao, Z Ding… - … Network, 2020 - ieeexplore.ieee.org
… Channel Models: In this article, the secure transmission of NOMA-UAV networks is based on
designed to extend secure transmission for several users via beamforming. In addition, AJ …